Intrusion detection systems

Results: 104



#Item
51toolsmith  ISSA Journal | May 2011 By Russ McRee – ISSA member, Puget Sound (Seattle), USA Chapter Prerequisites

toolsmith ISSA Journal | May 2011 By Russ McRee – ISSA member, Puget Sound (Seattle), USA Chapter Prerequisites

Add to Reading List

Source URL: holisticinfosec.org

Language: English - Date: 2011-05-02 15:02:44
52Soft Computing Models for Network Intrusion Detection Systems Ajith Abraham1 and Ravi. Jain2 1  Department of Computer Science, Oklahoma State University, USA

Soft Computing Models for Network Intrusion Detection Systems Ajith Abraham1 and Ravi. Jain2 1 Department of Computer Science, Oklahoma State University, USA

Add to Reading List

Source URL: www.softcomputing.net

Language: English - Date: 2005-02-04 10:21:43
53DATASHEET  InterMapper Comprehensive Network Monitoring, Mapping, and Alerting

DATASHEET InterMapper Comprehensive Network Monitoring, Mapping, and Alerting

Add to Reading List

Source URL: offers.skybotsoftware.com

Language: English - Date: 2015-01-15 14:53:02
54ByzID: Byzantine Fault Tolerance from Intrusion Detection Sisi Duan Karl Levitt Hein Meling Sean Peisert Haibin Zhang

ByzID: Byzantine Fault Tolerance from Intrusion Detection Sisi Duan Karl Levitt Hein Meling Sean Peisert Haibin Zhang

Add to Reading List

Source URL: www.ux.uis.no

Language: English - Date: 2014-11-29 05:01:28
55Intrusion Systems | UP 370 T LSN Matchtec Detector, Antimask  UP 370 T LSN Matchtec Detector, Antimask ▶ Linking of passive infrared and ultrasound systems ▶ Range of 6–10 m ▶ Temperature compensation

Intrusion Systems | UP 370 T LSN Matchtec Detector, Antimask UP 370 T LSN Matchtec Detector, Antimask ▶ Linking of passive infrared and ultrasound systems ▶ Range of 6–10 m ▶ Temperature compensation

Add to Reading List

Source URL: us.sourcesecurity.com

Language: English - Date: 2010-12-10 02:01:10
56I tre obiettivi della sicurezza • Confidenzialità: solo le persone autorizzate possono accedere al sistema informativo Intrusion Detection Systems Intrusione, controllo e contenimento nel digital warfare

I tre obiettivi della sicurezza • Confidenzialità: solo le persone autorizzate possono accedere al sistema informativo Intrusion Detection Systems Intrusione, controllo e contenimento nel digital warfare

Add to Reading List

Source URL: www.s0ftpj.org

Language: Italian - Date: 2005-08-21 17:33:38
    57Intrusion Systems | DS453Q and DS455Q Quad Beam Photoelectric Detectors  DS453Q and DS455Q Quad Beam Photoelectric Detectors ▶ Quad beam detection ▶ Four mounting options using optional mounting poles

    Intrusion Systems | DS453Q and DS455Q Quad Beam Photoelectric Detectors DS453Q and DS455Q Quad Beam Photoelectric Detectors ▶ Quad beam detection ▶ Four mounting options using optional mounting poles

    Add to Reading List

    Source URL: us.sourcesecurity.com

    Language: English - Date: 2010-01-08 04:06:18
    58The Journal of Systems and Software–175 www.elsevier.com/locate/jss Automated discovery of concise predictive rules for intrusion detection Guy Helmer, Johnny S.K. Wong *, Vasant Honavar, Les Miller

    The Journal of Systems and Software–175 www.elsevier.com/locate/jss Automated discovery of concise predictive rules for intrusion detection Guy Helmer, Johnny S.K. Wong *, Vasant Honavar, Les Miller

    Add to Reading List

    Source URL: www.cs.iastate.edu

    Language: English - Date: 2005-02-05 20:56:16
    59Microsoft Word - Corrigendum 2_final.doc

    Microsoft Word - Corrigendum 2_final.doc

    Add to Reading List

    Source URL: public.ccsds.org

    Language: English - Date: 2014-05-01 13:08:54
    603-2 D  ata Mining over Network Streams BAN Tao and KADOBAYASHI Youki Network monitoring and analyzing systems (NMASes) have been playing an active roll for preventing cyber attacks and providing practical and proactive

    3-2 D  ata Mining over Network Streams BAN Tao and KADOBAYASHI Youki Network monitoring and analyzing systems (NMASes) have been playing an active roll for preventing cyber attacks and providing practical and proactive

    Add to Reading List

    Source URL: www.nict.go.jp

    Language: English - Date: 2013-11-21 21:05:58